Abstracts - faqs.org

Abstracts

Business

Search abstracts:
Abstracts » Business

The psychology of computer crime

Article Abstract:

Computer crime is rising by up to 15 percent annually, much of it goes unreported or undetected, and more than 75 percent of it is committed by insiders. Companies cannot rely on security technology for protection against computer crime, and must realize that their greatest threat comes from people who work with their computer systems daily. Offenders often see data as abstract or intangible, and its theft therefore occurs in an 'ethical vacuum'; offenders also commonly believe theft of data cannot be traced to them, or cannot be detected at all. It is important for management to become actively involved in reducing abuse of computer data, and their most important step is to raise employees' security awareness. Companies can also use such precautionary measures as effective pre-employment screening, rotation of personnel in sensitive posts, and log-on audit trails.

Author: Carter, Roy
Publisher: Institute of Chartered Accountants in England & Wales
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1988
Psychological aspects, Computer crimes

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


The threat to computer systems - learning the rules of risk

Article Abstract:

A systematic approach to analyzing the risks to corporate computer systems is presented. Some threats to computer security are common to all installations, but the degree of risk in different areas varies from firm to firm. All risk consists of a threat of damage and the system's vulnerability to the threatened danger. The qualitative approach to risk analysis assesses the effectiveness of existing safeguards against a particular threat, identifies necessary improvements, and establishes the steps needed to implement improvements. Under the quantitative approach, a value is established for all of the assets associated with the computer system, and then the risks to the system and their probability of occurring are identified. The likely cost of a single occurrence is assessed and used to determine the amount to be spent on risk prevention.

Author: Carter, Roy
Publisher: Institute of Chartered Accountants in England & Wales
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1987
Computers, Digital computers

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Loss of memory - an unforgettable experience

Article Abstract:

The loss of computer records can seriously impair a company's ability to operate. Planning steps involved in protecting computer systems against losses caused by natural disaster are discussed. A good disaster plan should identify possible emergencies, and establish the methods and costs involved in restoring services. All disaster plans should be formalized, detailed, and key personnel should know what their tasks are in the event of an accident.

Author: Carter, Roy
Publisher: Institute of Chartered Accountants in England & Wales
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1987
Technology application, Protection and preservation, Computer storage devices, Disaster relief

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Safety and security measures, Electronic data processing departments, Data processing departments
Similar abstracts:
  • Abstracts: The economic consequences of increased disclosure. The role of supplementary statements with management earnings forecasts
  • Abstracts: The real interest rate puzzle. The real interest rates puzzle
  • Abstracts: A rose.com by any other name. Equity premia as low as three percent? Evidence from analysts' earnings forecasts for domestic and international stocks
  • Abstracts: Maturity intermediation and intertemporal lending policies of financial intermediaries. Optimal futures positions for large banking firms
  • Abstracts: The horizon widens and auditors face new watershed. Law reform: It's in need of reform. Independence: a new perception needed
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.